In CureKit versions v1.0.1 through v1.1.3 are vulnerable to path traversal as the function isFileOutsideDir fails to sanitize the user input which may lead to path traversal.
References
Link | Resource |
---|---|
https://github.com/whitesource/CureKit/commit/af35e870ed09411d2f1fae6db1b04598cd1a31b6 | Patch Third Party Advisory |
https://www.mend.io/vulnerability-database/CVE-2022-23082 | Vendor Advisory |
https://github.com/whitesource/CureKit/commit/af35e870ed09411d2f1fae6db1b04598cd1a31b6 | Patch Third Party Advisory |
https://www.mend.io/vulnerability-database/CVE-2022-23082 | Vendor Advisory |
Configurations
History
21 Nov 2024, 06:47
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/whitesource/CureKit/commit/af35e870ed09411d2f1fae6db1b04598cd1a31b6 - Patch, Third Party Advisory | |
References | () https://www.mend.io/vulnerability-database/CVE-2022-23082 - Vendor Advisory |
Information
Published : 2022-05-31 15:15
Updated : 2024-11-21 06:47
NVD link : CVE-2022-23082
Mitre link : CVE-2022-23082
CVE.ORG link : CVE-2022-23082
JSON object : View
Products Affected
mend
- curekit
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')